Chapter 13: Multimedia Chapter 14: Security, Privacy & Ethics

Download Report

Transcript Chapter 13: Multimedia Chapter 14: Security, Privacy & Ethics

Social and Ethical Issues in Computing:
Doing the Right Thing
CIS 105
Topics





Identify social issues and ethics in computing
Understand the digital divide social issue and its
effect in society
List and describe ergonomic issues
Explain the significance of intellectual property
rights
List different computer risks and measures to
prevent computer and data loss
2
The Digital Divide




Separates the computing haves from the
have-nots
Those with access to computers and the
Internet take advantage of personal and
economic opportunities
Those without access fall farther behind
Major divisions among nations
and within countries


between urban areas and
rural ones
between rich and poor
3
Green Computing



Computers can affect the environment through
 the power they consume
 the supplies required for their use
 disposal of obsolete equipment
Green computing refers to addressing these
factors in an environmentally responsible manner.
Energy Star – limit power consumption
when idle.
4
Managing Power Consumption

Use Window’s
Control Panel
Power Options
5
Ergonomic Equipment
6
Ergonomics




Ergonomics is the use of research in designing
systems, programs, or devices that are
appropriate to use for their intended purposes.
In the context of computers, ergonomics refers to
human factors related to the use of computers.
Repetitive Strain Injury (RSI) caused by
repetition, speed, awkward positioning, and
holding a static position.
Computer users suffer from neck, shoulder, back,
and leg problems, but the most common is Carpal
Tunnel Syndrome (next slide).
7
Carpal Tunnel Syndrome
Carpal tunnel
syndrome is a
condition in which
the median nerve is
compressed within
the carpal tunnel
and unable to
function properly.
carpal_tunnel.pdf
Median nerve
passing through
the carpal tunnel
formed by the
carpal bones and
transverse carpal
ligament.
Median
nerve
8
Protecting Children on the Internet


The Internet offers many opportunities for
children, as well as dangers
Ways to protect children




Blocking software – based
on objectionable material.
Place the child’s computer in a public area
instead of his or her bedroom
Restrict usage when parents are not present
Password protect computer access
9
Ethics in Computing

Ethics – standards of moral conduct




Used to help determine the proper course of
action in difficult situations.
Computer ethics are standards for everyone
involved with computing - professionals and
general users.
Association for Computing Machinery –
Code of Ethics: www.acm.org
Ten Commandments of Computer Ethics
Computer Ethics Institute (1992)
www.brookings.edu/its/cei/overview/
Ten_Commanments_of_Computer_Ethics.htm
(see next slide)
10
Ten Commandments of Computer Ethics
Computer Ethics Institute
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Thou shalt not use a computer to harm other people.
Thou shalt not interfere with other people’s computer work.
Thou shalt not snoop around in other people’s computer files.
Thou shalt not use a computer to steal.
Thou shalt not use a computer to bear false witness.
Thou shalt not copy or use proprietary software for which you
have not paid.
Thou shalt not use other people’s computer resources without
authorization or proper compensation.
Thou shalt not appropriate other people’s intellectual output.
Thou shalt think about the social consequences of the
program you are writing or the system you are designing.
Thou shalt always use a computer in ways that insure
consideration and respect for your fellow humans.
11
Intellectual Property Rights




Refers to results of intellectual activity in the
industrial, scientific, literary, or artistic fields.
U.S. Copyright Act (copyright protection) provides
the creator of a literary and artistic work over the
use and distribution of that work.
Fair use provision permits use of works for limit
purposes (news, education, research, etc.).
Copy-protection schemes make it difficult to copy
CDs and DVDs; Many users claim this violates
their fair use rights, because they should be
entitled to make a backup copy.
12
Lawful Protection


Encryption is a process of converting readable data into
unreadable characters to prevent unauthorized reading if
the file or text is captured.
Plagiarism is the representation of someone else’s words or
ideas as your own.



Work taken from the Internet must be cited if it is used in a paper or
some other form of presentation.
Patents protect inventions and help encourage inventors to
purse their work.
 Grant patent holder exclusive rights to the invention for
20 years.
A Trademark is a word, name, symbol, or device used to
distinguish one company and its products from another.
Unauthorized use is prohibited.
13
Apple vs. Microsoft - GUI





Apple Computer, Inc. v. Microsoft Corp., 35 F.3d
1435 (9th Cir. 1994) was a copyright infringement lawsuit
in which Apple Computer sought to prevent Microsoft and
Hewlett-Packard from using visual graphical user interface
(GUI) elements that were similar to those in Apple's Lisa
and Macintosh operating systems.
Apple claimed the "look and feel" of the Macintosh
operating system, taken as a whole, was protected by
copyright.
The fact that Apple and Microsoft had entered into the
licensing agreement for Windows 1.0 made a large part of
the case a mere contractual matter rather than a matter
of copyright law.
en.wikipedia.org/wiki/Apple_v._Microsoft
Now … it’s Apple vs. Microsoft over iPod User Interface Patent
www.devhardware.com/c/a/Opinions/Its-Apple-vs-Microsoft-over-iPod-Patent/
14
Computer Risks

Computer Crime – any illegal
act involving a computer





Hacker – accesses a computer or network illegally, but
usually to demonstrate security holes.
Cracker – accesses a computer or network illegally, but
usually have the intent of destroying data, stealing
software or information, and other malicious actions.
Hardware theft and vandalism
System failure
Virus, spyware, and adware (see next few slides…)
15
Virus




A Virus is a program that is installed on a
computer.
Users may download it accidentally or
intentionally not knowing that it was
malicious.
A Worm is a program that copies itself from
computer to computer over a network.
A Trojan Horse is a program that
piggybacks onto or looks like a legitimate
program.
16
Spyware and Adware

Spyware is a program that secretly collects
information about the user, such as passwords.



When the user connects to the Internet the
information is sent to collecting site.
Spyware may also grant unauthorized connections
to you computer.



Key loggers – record key strokes
Back Doors – grant access to computer
Adware software can bring unwanted ads and
collect data on your Web surfing habits.
Be sure to use a virus protection program…
17
Virus Protection and Definition Files





Install antivirus program on all computers.
The definition file must be updated regularly, so
that you may be protected from the latest virus.
The definition file contains the unique “signature”
of each virus.
Scan downloaded files before opening them.
GriSoft's AVG Anti-Virus Free Edition:


free.grisoft.com
Also use Spyware and Adware removal programs:


SPYBOT Search and Destroy – www.spybot.info
Ad-Aware SE – www.lavasoftusa.com
18
Other Protection




Install a firewall which is a combination of hardware
and software that blocks unauthorized network
connections to and from your computer.
Download and install Window Updates regularly, or
set your computer to Automatic Updates (Control
Panel). update.microsoft.com/windowsupdate/
Use surge protectors to protect the system from
electrical surges and spikes.
Install an Uninterruptible Power Supplies (UPS)
which is battery backup
so that a system may
be shutdown correctly
in case power is lost.
19
Computer Forensics




Computer Forensics is the uncovering
computer-stored information suitable for
use as evidence in courts of law.
Restore files and/or e-mail messages that
have been deleted.
Examine data and log files on computers
and network servers.
Specialist must have extensive knowledge
of hardware, software, networks, and law.
20
Computer Security


Computer hardware, software, and
information (databases) must be protected
from deliberate action, computer
malfunction, or natural disaster.
Must have a Disaster Recovery Plan…
(next slide)
21
Disaster Recovery Plan

Emergency plan specifies the steps to be taken
immediately after a disaster strikes.


Backup plans specifies how to use backup files and
equipment to resume information processing.



Names and number of individuals, facility shutdown, evacuation,
and return procedures – may vary by type of disaster
List location of backups, backup schedules, alternate sites.
Recovery plan specifies the actions to restore full
information processing, and may vary by type of disaster.
Test plan contains information for simulating various
levels of disasters.

Need to make sure the plan is going to work.
22
Backup Procedures






Backup to CD-RW, DVD-RAM, or external hard drives.
Full backup – copies all files
Differential backup – copies all files that have
changed since the last full backup.
Incremental backup – copies all files that have
changed since either the last full backup or the last
incremental backup.
Restoration – is the process of retrieving data from
a backup.
Need Backup Software that provide these options.
23
Backup Comparisons
24
Differential vs. Incremental
Full
Restoration:
Full backup restored and
then only Differential 3
Differential 1
Differential 2
Differential 3
Restoration:
Full backup restored and
then each Incremental
Full
Incremental 1
Incremental 2
Incremental 3
25
Controlling Access

What you have (Physical)



What you know


Password, pin code, mother’s maiden name
What you do


Cables and locks
Badge, key, or card to give you physical access to the
computer room or a locked terminal
Signature, job role
What you are

Biometrics is application of technology to authenticate a
person’s identity by verifying a personal characteristic.
26
MCC Related Courses




BPC170 - Computer Maintenance
CIS270 - Essentials of Network and Information
Security
CIS247DA - Cyber Forensics and Incident
Handling
CIS 247DL - Legal Issues in Information
Assurance
27